Locked History Actions

Diff for "Related Publications"

Differences between revisions 4 and 5
Revision 4 as of 2016-05-30 14:13:49
Size: 1819
Editor: paravengers
Comment:
Revision 5 as of 2016-05-30 14:32:51
Size: 1827
Editor: paravengers
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
= Implementations of Masking = = Implementations of automated Masking =
Line 9: Line 9:
 *

Implementations of automated Masking

  • Andrew Moss, Elisabeth Oswald, Dan Page, and Michael Tunstall. Compiler Assisted Masking. In Emmanuel Prouff and Patrick Schaumont, editors, CHES, volume 7428 of LNCS, pages 58–75. Springer, 2012

  • G. Agosta, A. Barenghi, M. Maggi and G. Pelosi, "Compiler-based side channel vulnerability analysis and optimized countermeasures application" Design Automation Conference (DAC), 2013 50th ACM/EDAC/IEEE, Austin, TX, 2013, p. 1-6.

Obfuscation

Model of attacker

In the case of cyber attacks